EP3713261A1 - Aggressionsverwaltung für eine mobile vorrichtung - Google Patents

Aggressionsverwaltung für eine mobile vorrichtung Download PDF

Info

Publication number
EP3713261A1
EP3713261A1 EP19000141.2A EP19000141A EP3713261A1 EP 3713261 A1 EP3713261 A1 EP 3713261A1 EP 19000141 A EP19000141 A EP 19000141A EP 3713261 A1 EP3713261 A1 EP 3713261A1
Authority
EP
European Patent Office
Prior art keywords
policy
mobile device
enforcement engine
communication module
policy enforcement
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP19000141.2A
Other languages
English (en)
French (fr)
Inventor
Vui Huang Tea
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Giesecke and Devrient Mobile Security GmbH
Original Assignee
Giesecke and Devrient Mobile Security GmbH
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Giesecke and Devrient Mobile Security GmbH filed Critical Giesecke and Devrient Mobile Security GmbH
Priority to EP19000141.2A priority Critical patent/EP3713261A1/de
Publication of EP3713261A1 publication Critical patent/EP3713261A1/de
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/02Power saving arrangements
    • H04W52/0209Power saving arrangements in terminal devices
    • H04W52/0225Power saving arrangements in terminal devices using monitoring of external events, e.g. the presence of a signal
    • H04W52/0238Power saving arrangements in terminal devices using monitoring of external events, e.g. the presence of a signal where the received signal is an unwanted signal, e.g. interference or idle signal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/02Power saving arrangements
    • H04W52/0209Power saving arrangements in terminal devices
    • H04W52/0251Power saving arrangements in terminal devices using monitoring of local events, e.g. events related to user activity
    • H04W52/0254Power saving arrangements in terminal devices using monitoring of local events, e.g. events related to user activity detecting a user operation or a tactile contact or a motion of the device
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/90Services for handling of emergency or hazardous situations, e.g. earthquake and tsunami warning systems [ETWS]
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Definitions

  • the present invention is directed towards a policy based aggression management of a mobile device in a mobile telecommunication infrastructure along with a system arrangement being adapted accordingly. Furthermore, the present invention is directed towards an embedded Universal Integrated Circuit Card for operating at least a part of the suggested method steps and for usage as a component within the system arrangement. The present invention allows a flexible aggression management and requires only little technical effort. Moreover, a computer program product is suggested comprising instructions for operating the suggested system arrangement and implementing the method steps.
  • US 8,516,552 B2 teaches a wireless end-user communication device comprising a user interface and at least one processor configured to perform policy management.
  • a mobile end device communicates with further end devices using physical resources of the infrastructure. Consequently, the infrastructure provides additional network components which provide specific resources to the end device.
  • An example regarding such a resource is the available bandwidth, which allows the end device to transmit data under certain limitations.
  • the end device has to subscribe to a network and request such resources. Typically, the end device meets such restrictions but it may occur that the end device obtains excessively large amounts of data or transmits data.
  • similar actions may be performed over and over again resulting in no further advantages but only produce overhead. Such behavior blocks hardware resources at no further advantage and shall be prevented.
  • the described behavior may be based on an error regarding the implementation of protocols but likewise an attack may be performed using such behavior.
  • an end device allocates large amounts of resources it can be concluded that a violation is present, which is generally referred to as an aggression.
  • an aggression describes the fact that an end device allocates excessively large amounts of resources. Such behavior may result in a lack of available hardware resources and consequently, may affect further communication sessions of other communications partners.
  • An IoT device overusing the network may lead to problems such as reduced lifetime of the SIM card by increasing dramatically the read/ write cycles, increased power consumption of the device due to continuous restarts which may also affect the device lifetime, local issues within the MNO's network such as cell congestion, capacity and performance problems within the MNO's core network, such as signaling storms, which result in wide area network disruption, negatively impacting the IoT service performance, potentially resulting in delayed communications, degradation of service quality and even service outages amongst others.
  • MNO is an abbreviation for Mobile Network Operator.
  • SIM-based RPM parameters shall take precedence over any Communication Module Firmware based RPM parameters. Functionalities related to RPM Operation Management Counters shall be disabled if RPM parameters are not present on the SIM.
  • the state of the art has recognized such problems and provides a solution referring to policy management in the context of aggression handling.
  • the prior art provides specific implementations which are deployed on the so-called Communication Module.
  • the Communication Module is typically not standardized and typically not updated.
  • the Communication Module vendors have to be persuaded and convinced to adopt the latest version of the Policy Enforcement Engine. Consequently, end devices are delivered comprising a Communication Module which is not up to date and consequently, outdated policies are delivered to the client.
  • a method for policy based aggression management of a mobile device in a mobile telecommunication infrastructure comprising providing a Policy Enforcement Engine and providing a set of rules forming the policy, each rule describing an interaction of the mobile device with the mobile telecommunication infrastructure using a Communication Module, operating the policy by means of the provided Policy Enforcement Engine, wherein the Policy Enforcement Engine at least in part controls the Communication Module and the Policy Enforcement Engine is operated on an embedded Universal Integrated Circuit Card of the mobile device.
  • the solution has three main components, namely a policy being defined by the Mobile Network Operator MNO.
  • the policy defining the intended interaction of the USIM, also referred to as embedded Universal Integrated Circuit Card, and consequently, the Communication Module with the mobile network, based on the Mobile Network Operator's specific access preferences.
  • one component is a USIM based Policy Enforcement Engine, coupled with the USIM based quality of service for conscious network awareness to initiate preemptive remedial actions.
  • One further component is the over-the-air network agnostic policy and engine distribution/update server.
  • the USIM is owned by the MNO and a separate entity from the Communication Modules.
  • a USIM based policy enforcement engine can be remotely updated OTA by the MNO in bulk at any time. This eliminates proliferation of multiple generations of outdated or flawed Communication Module based policy enforcement engines.
  • the MNO sets the pace and has ultimate control.
  • the MNO defined policy according to an aspect of the present invention can be assigned or changed via the following options:
  • the suggested method provides a policy for avoidance or at least handling of aggressions.
  • An aggression in this context refers to any violation of resource allocation limitations. In case an end device excessively uses resources this can be called an aggression, which has to be avoided or handled once it occurs. Examples for an aggression are massive amounts of bandwidth or high power consumptions.
  • a mobile device may be any mobile device whatsoever, for instance a mobile phone or a device being organized in the so-called internet of things IoT.
  • the mobile device communicates over a mobile telecommunication infrastructure providing services.
  • the mobile telecommunication infrastructure is operated by the so-called Mobile Network Operator MNO, while the mobile devices as such are provided by a vendor or manufacturer.
  • MNO Mobile Network Operator
  • the mobile devices and the mobile telecommunication infrastructure implement commonly known techniques.
  • a Policy Enforcement Engine refers to a specific module, may it be implemented in hardware and/ or software that firstly manages the policies and secondly makes sure that the policies as such are respected. Consequently, the Policy Enforcement Engine may be a software module being operated on a SIM card. The Policy Enforcement Engine is able to update rules of the policy, at additional rules or delete existing rules. Consequently, every operation regarding the management of the set of rules can be performed using this specific unit.
  • the policy describes rules which have to be followed by the mobile device and/or the Communication Module, respectively. Such a rule may demand that a mobile device is able to obtain a specific amount of data or pose a specific number of communication rule requests. Once such rules are exceeded a violation and consequently an aggression occurs.
  • Each rule describes an interaction of the mobile device with the mobile telecommunication infrastructure such as a data request or a specific request to subscribe to the telecommunication infrastructure.
  • a Communication Module which is an interface mediating between the mobile device and the mobile telecommunication infrastructure.
  • the end device may comprise applications along with a Communication Module.
  • the Communication Module as such may comprise further Communication Module firmware, a radio baseband chipset and at least an interface for communication with the SIM card.
  • the Communication Module may be any communication component, which provides wide area radio connectivity. In general, the Communication Module provides an interface for communication with the outside of the end device, namely the telecommunication infrastructure.
  • An interaction of the mobile device with the mobile telecommunication infrastructure may be that the mobile device attempts to subscribe to a mobile telecommunication infrastructure for instance using a specific subscription profile. In case several subscription attempts fail an alternative subscription profile can be used and consequently, the aggression of iteratively attempting to subscribe can be remedied.
  • Operating the policy means that the Policy Enforcement Engine makes sure that the data communication or in general the operation of the hardware and software components is performed properly. Hence, the Policy Enforcement Engine makes sure that the rules of the policy are met and especially, in case an aggression or violation occurs the Policy Enforcement Engine selects actions to be performed in response to such an aggression.
  • the Policy Enforcement Engine is able to control the Communication Module such that the Communication Module has to implement the set of rules provided by the Policy Enforcement Engine. In case specific rules are not met the Communication Module can be controlled to correct such deficiencies and consequently, a proper communication is implemented.
  • the Communication Module may support the so-called SIM Toolkit STK and for instance the so-called "Run At" command and the USIM-based Policy Enforcement Engine will also be able to directly control the Communication Module's communication functions.
  • the Policy Enforcement Engine is operated on an embedded Universal Integrated Circuit Card of the mobile device and is not operated in the Communication Module as such as suggested by the prior art.
  • This provides the advantage that the Policy Enforcement Engine and especially the policy as such can be updated at any time over-the-air. Consequently, the advantage arises that not the Communication Module has to be exchanged but rather at runtime the SIM card can be updated.
  • An update of the SIM card is commonly known and can be performed using specific Over-the-Air OTA services and provisioning services. These mechanisms are used for updating the SIM card in the present context. Consequently, it is possible to update the policy management using the SIM card which is open for any access, for instance by the Mobile Network Operator MNO.
  • the policy is updated over-the-air.
  • the Communication Module can be used to receive data for updating the policy along with the Policy Enforcement Engine. In this way respective updates can be performed once the end device is in the field and consequently such updates can be performed at any time.
  • the set of rules describes a resource allocation, a communication behavior and/or an energy consumption behavior.
  • the set of rules describes a data amount being transmitted or received. This provides the advantage that the telecommunication infrastructure can be prevented from an overload and an aggression regarding data consumption can be identified.
  • the set of rules describes a number of data requests.
  • This provides the advantage that in case a mobile device does not manage to subscribe to a telecommunication infrastructure successfully a different subscription profile can be used. For doing so, it is of advantage to specify a number of data requests which has to be exceeded such that a specific action is triggered. For instance, in case the mobile device requests data which is not available such requests can be restricted and the telecommunication infrastructure is likewise prevented from overload.
  • the set of rules describes at least one action consuming bandwidth and/or energy.
  • This provides the advantage that the overall functionality of the end device can be monitored and controlled accordingly.
  • An aggression does not only refer to the usage of bandwidth but rather an energy consumption is likewise of disadvantage in case it can be considered to be an aggression.
  • the set of rules describes a consequence in case at least one rule is not met.
  • a response can be specified in case one specific rule is not met.
  • Such a consequence may for instance be a triggering of an alternative action. For instance, in case a mobile device sends several data requests such data requests can in consequence be summarized as one single data request and bandwidth and energy is saved accordingly.
  • a specific policy is provided for each mobile device or each type of mobile devices. This provides the advantage that the Mobile Network Operator MNO can specify specific policies or restricts specific types of mobile devices using specific policies. Consequently, customization can be performed and each mobile end device receives a specific policy.
  • the embedded Universal Integrated Circuit Card communicates with the Communication Module using a SIM application toolkit.
  • SIM application toolkit This provides the advantage that predefined commands can be reused and specific commands can be executed to control the functionality of the Communication Module. In this way it is possible to control the functionality of the Communication Module by the SIM card.
  • the mobile device is a narrowband device.
  • This provides the advantage that end devices being organized in the so-called internet of things can likewise be integrated in the suggested method and system arrangement. This is especially of advantage as the energy consumption of such a narrowband device can be controlled efficiently.
  • the mobile device queries at least one sensor for operating the policy.
  • the end device as such may operate a sensor and consequently, the set of rules can be respected by own sensor data.
  • the end device may for instance measure a bandwidth consumption or an energy consumption and consequently it can be checked whether the set of rules is met or not.
  • the Policy Enforcement Engine performs power management of the mobile device. This provides the advantage that power consuming tasks can be adapted to be in conformance with the policy and consequently, energy consumption can be restricted.
  • an embedded Universal Integrated Circuit Card eUICC arranged for usage in the suggested method. Consequently, an embedded Universal Integrated Circuit Card is suggested which implements the Policy Enforcement Engine, which means that the respective policy along with instructions for enforcement are both stored and operated on the SIM card.
  • the object is also solved by a system arrangement for policy based aggression management of a mobile device in a mobile telecommunication infrastructure comprising a Policy Enforcement Engine and a storage holding a set of rules forming the policy, a rule describing an interaction of the mobile device with the mobile telecommunication infrastructure using a Communication Module, an interface unit for operating the policy by means of the provided Policy Enforcement Engine, wherein the Policy Enforcement Engine is arranged to at least in part control the Communication Module and the Policy Enforcement Engine is operated on an embedded Universal Integrated Circuit Card of the mobile device.
  • the object is also solved by a computer program product being arranged to perform the suggested method and operate the suggested system arrangement.
  • the method comprises method steps which can likewise be implemented by functionality of the structural features of the system arrangement.
  • the system arrangement holds structural features which provide functionality being similar to the suggested method steps. Consequently, the suggested method is able to operate the system arrangement and the system arrangement is able to perform the suggested method.
  • Fig. 1 shows a Communication Module which interacts with a USIM, which stands for Universal Subscriber Identity Module.
  • the USIM may be implemented as an embedded Universal Integrated Circuit Card eUICC.
  • the arrangement as depicted in Fig. 1 provides the disadvantage that the policy enforcement is accomplished by the Communication Module and typically the Mobile Network Operator MNO has no access to update respective policy components.
  • Fig. 2 suggests an adaption where the USIM holds respective components such as the Policy Enforcement Engine, the policy as such, the Quality of Service Engine and further USIM files.
  • the Policy Enforcement Engine the Policy Enforcement Engine
  • the Policy as such the Policy as such
  • the Quality of Service Engine the Quality of Service Engine
  • further USIM files As can be seen in the policy component specific rules are provided which can be described as follows.
  • the policy may consist of rules, actions and conditions.
  • the following is an example for demonstration purposes:
  • Fig. 3 shows how the functionality of the Communication Module can at least in part be controlled by the USIM, especially the Policy Enforcement Engine.
  • the Communication Module supports the SIM Toolkit and especially the "Run At" command the USIM-based Policy Enforcement Engine will be able to directly control the Communication Modules communication functions.
  • the Communication Module as such still performs the network functionality and accordingly, provides an interface but the control is performed by the USIM, and especially the Policy Enforcement Engine. Consequently, each action performed by the Communication Module is in conformance with the underlying policy as the Policy Enforcement Engine only allows such actions.
  • Fig. 4 shows on the left hand side how Communication Module based policy rules may look like and especially how Communication Module based policy actions look like.
  • the telecommunication infrastructure may count the IMSI attaches, which can likewise be performed by the USIM by counting IMSI EF reads.
  • IMSI is an abbreviation for International Mobile Subscriber Identity while EF refers to elementary files.
  • the network performance may be monitored as it responds to the number of subscribed end devices. In case too many end devices and consequently, too many IMSI are present respective end devices can be blocked or the respective IMSI can be invalidated.
  • the Policy Enforcement Engine evaluates the rules and executes the actions.
  • the underlying hardware may be a narrowband internet of things end device and infrastructure. Similar to the policy rules referring to the network load the power management can be performed such that an aggression is considered as an energy consumption which is performed at high level and consequently, a respective action can be performed.
  • NB-IoT As NB-IoT gains acceptance, more applets are installed and are operated on the NB-IoT SIM. Each applet creates its own network connection to send data at different time and sequence, creating an energy drain on the low-power NB-IoT device.
  • NB-IoT refers to narrowband internet of things.
  • Indiscriminate uplink of data when the signal is weak requires a lot of energy as opposed to sending the uplink data when the signal is stronger.
  • the solution is for a central applet to monitor battery usage, power consumption and signal strength, and to send the consolidated uplink data on behalf of all the other applets at optimal times when the signal strength is stronger and energy consumption is less.
  • Priority tagging of data allows the central applet to determine which data to send when adverse network and battery conditions are encountered.
  • the power management applet would be the singular applet that monitors the power consumption/ battery usage, and signal strength status/pattern. From this it can determine which type of data uplink is permitted and which is to be deferred or dropped based on the indicated priority. High-priority data will be sent even if battery level is low or low signal strength requires a lot of energy to transmit the data, e.g. call for help/ emergency. Data uplink of low-to-medium priority data occurs only when the signal is good and transmission requires less energy. Deferred and consolidated data uplink reduces energy required for multiple data connections and associated overheads. If battery status is below a certain pre-defined threshold, only high priority uplink data is processed and sent. Low-priority data may be discarded.
  • Fig. 5 shows a flowchart depicting a method for policy based aggression management of a mobile device in a mobile telecommunication infrastructure, comprising providing 100 a Policy Enforcement Engine and providing 101 a set of rules forming the policy, each rule describing an interaction of the mobile device with the mobile telecommunication infrastructure using a Communication Module, operating 102 the policy by means of the provided 100 Policy Enforcement Engine, wherein the Policy Enforcement Engine at least in part controls 103 the Communication Module and the Policy Enforcement Engine is operated on an embedded Universal Integrated Circuit Card of the mobile device.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
EP19000141.2A 2019-03-20 2019-03-20 Aggressionsverwaltung für eine mobile vorrichtung Withdrawn EP3713261A1 (de)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP19000141.2A EP3713261A1 (de) 2019-03-20 2019-03-20 Aggressionsverwaltung für eine mobile vorrichtung

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
EP19000141.2A EP3713261A1 (de) 2019-03-20 2019-03-20 Aggressionsverwaltung für eine mobile vorrichtung

Publications (1)

Publication Number Publication Date
EP3713261A1 true EP3713261A1 (de) 2020-09-23

Family

ID=65910880

Family Applications (1)

Application Number Title Priority Date Filing Date
EP19000141.2A Withdrawn EP3713261A1 (de) 2019-03-20 2019-03-20 Aggressionsverwaltung für eine mobile vorrichtung

Country Status (1)

Country Link
EP (1) EP3713261A1 (de)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20220312185A1 (en) * 2021-03-26 2022-09-29 At&T Intellectual Property I, L.P. Subscriber identity module based radio policy manager

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8516552B2 (en) 2009-01-28 2013-08-20 Headwater Partners I Llc Verifiable service policy implementation for intermediate networking devices
US20170238186A1 (en) * 2012-05-23 2017-08-17 Kt Corporation Method for control and enforcement of policy rule and euicc
US20170318465A1 (en) * 2012-11-19 2017-11-02 Kt Corporation Method for configuring profile of subscriber authenticating module embedded and installed in terminal device, and apparatus using same

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8516552B2 (en) 2009-01-28 2013-08-20 Headwater Partners I Llc Verifiable service policy implementation for intermediate networking devices
US20170238186A1 (en) * 2012-05-23 2017-08-17 Kt Corporation Method for control and enforcement of policy rule and euicc
US20170318465A1 (en) * 2012-11-19 2017-11-02 Kt Corporation Method for configuring profile of subscriber authenticating module embedded and installed in terminal device, and apparatus using same

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
"GSM Association, Official Document TS.34 teaches a policy based aggression management solution", IOT DEVICE CONNECTION EFFICIENCY GUIDELINES, 30 March 2016 (2016-03-30)
DAVID K SMITH: "eUICC Policy Control Architecture;SCPREQ(11)0141_eUICC_Policy_Control_Architecture", ETSI DRAFT; SCPREQ(11)0141_EUICC_POLICY_CONTROL_ARCHITECTURE, EUROPEAN TELECOMMUNICATIONS STANDARDS INSTITUTE (ETSI), 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS ; FRANCE, vol. SCP, 17 September 2011 (2011-09-17), pages 1 - 7, XP014099011 *
GSMA: "IoT Device Connection Efficiency Guidelines Version 3.0 30", vol. TSG CT, no. ; 20160330, 12 September 2016 (2016-09-12), XP051621299, Retrieved from the Internet <URL:http://www.3gpp.org/ftp/tsg%5Fct/TSG%5FCT/TSGC%5F73%5FNew%5FOrleans/Docs/CP%2D160534%2Ezip> [retrieved on 20160912] *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20220312185A1 (en) * 2021-03-26 2022-09-29 At&T Intellectual Property I, L.P. Subscriber identity module based radio policy manager
US11638142B2 (en) * 2021-03-26 2023-04-25 At&T Intellectual Property I, L.P. Subscriber identity module based radio policy manager

Similar Documents

Publication Publication Date Title
EP3073777B1 (de) Verwaltungsverfahren für eingebettete universelle ic-karte und zugehörige vorrichtung
US11070989B2 (en) Network slice management method, management unit, and system
US8351920B2 (en) System and method for femtocell management
US20110310731A1 (en) Controlling network resource usage of machine type communication (mtc) devices
US11057309B2 (en) Management method, management unit, and system
US10764349B2 (en) Self-organizing network communication
CN106954225B (zh) 无线漫游的方法、装置及无线设备
US10097646B2 (en) Method and device for enabling or disabling server in wireless communication system
US20220264440A1 (en) Network-slice control server, service server, and respective control methods thereby
US20210004222A1 (en) Over-the-air firmware updates for dual-mode internet of things devices
US20190007824A1 (en) A method for controlling an embedded subscriber identity module
CN110519350B (zh) 一种终端的调度方法及装置
EP3713261A1 (de) Aggressionsverwaltung für eine mobile vorrichtung
EP2869602A1 (de) Funkeinrichtung und Verfahren zur Mehr-Domänen Überwachung und Zugriffsmanagement
EP3713308A1 (de) Verfahren und vorrichtung zur konfiguration von netzwerkscheiben und computerspeichermedium
CN108476427B (zh) 无线接入点、操作无线接入点的方法、计算机可读存储介质
CN111182536A (zh) Sim卡状态检测方法、装置、网络设备及存储介质
JP7408824B2 (ja) QoS通知のための方法及びネットワークノード
EP3240242B1 (de) Empfehlungsvorrichtung für ein kommunikationsnetzwerk
US20240056930A1 (en) Mobile communication device and computer-implemented method of operating a mobile communication device
US20230026025A1 (en) Methods and apparatus for selecting between and using a plurality of service provider networks
CN107736042B (zh) 用于操作无线通信设备的方法
CN115088237A (zh) 用于客户控制网络事件的方法和装置
EP2709387A1 (de) Verfahren zur Änderung der Netzwerkverwendung in einem mobilen Telekommunikationssystem

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

AX Request for extension of the european patent

Extension state: BA ME

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION HAS BEEN WITHDRAWN

18W Application withdrawn

Effective date: 20201014